The problem-solving process requires two preliminary steps: explain and incubate.

The process of problem-solving is first to explain and explore the situation and objectives. We can ask questions and share information, but we can’t propose solutions. Then we require an incubation period for subconscious problem-solving during which we undertake some mundane activity. Then we cooperate on finding solutions.

Security exists in a continuum. Something pretty obvious for the people in the industry, but which has to be stated more often since there are many parties claiming perfect security or, as in the case of Bloomberg, arguing that better security is just as useless as little security:

Security is not binary, which is obvious if you give it even a moment’s thought. A locked door is more secure than an unlocked one. A door with two locks is more secure than one with a single lock. A locked door with a locked gate in front of it is more secure than one without a gate. In the same way a door is more secure locked than unlocked, messaging of any sort is more secure encrypted than unencrypted. End-to-end encrypted messaging is more secure than encryption that is not end-to-end.

The Locard’s Exchange Principle – met in one of the best books I read recently:

NOT EVERYBODY KNOWS THIS – OR CARES PROBABLY – BUT THE FIRST LAW of forensic science is Locard’s Exchange Principle, and it says ‘Every contact between a perpetrator and a crime scene leaves a trace.’ As I stand in this room, surrounded by dozens of voices, I’m wondering if Professor Locard had ever encountered anything quite like Room 89 – everything touched by the killer is now in a bath full of acid, wiped clean or drenched in industrial antiseptic. I’m certain there’s not a cell or follicle of him left behind.

The efficiency gain of the electric vehicles is overwhelming. This time Bloomberg gets it right:

About 10 million barrels a day of oil demand – roughly what Saudi Arabia produces now – isn’t merely switched into another form of energy. It’s just gone. Such is the power of efficiency. EVs convert a far higher proportion of the energy from the socket to power their wheels than a conventional vehicle does. Thermal energy generates a lot of waste in the form of heat. Only about one in four or five of those gallons of gasoline you pump and pay for provide energy you actually use, and perhaps 60-70% of what statisticians call the world’s primary energy use is really just waste

Abusability testing – funny name found by Ashkan Soltani in his Enigma talk where he looks into the ways the technology can be used to cause harm. Abusability testing is an innovative and intriguing way to look into the possible ways the technology used in un-intended ways can cause harm to the others. Red teams are used to explore the ways that other can harm your organization, but it’s time to think about the possible ways that technology can be (mis)used and have a negative impact on others. The leading example (with the Kim Jong-nam) is eyes opening.

Bayrob malware: a fascinating story about 3 Romanians behind an extremely complex online fraud operation along with a massive malware botnet. Tens of millions of dollars in nine years, but they are fortunately going to jail.

The first image of a black hole has been recently taken by EU-funded scientists. Two notes: (1) the EU should make more efforts to advertise its research efforts and (2) for me this is a remarkable achievement, comparable to taking a photo of an emotion. It’s borderline philosophical, and the scientists effort has been tremendous.

The black hole at the centre of Messier 87, a massive galaxy in the constellation of Virgo. This black hole is located 55 million light-years from Earth and has a mass 6.5-billion times larger than our sun.

The Norwegians are moving in the right direction. After launching a project to install in Oslo the world’s first wireless electric car charging stations for taxis, it recently decided to withdraw its support for oil exploration offshore the sensitive Lofoten islands in Norway’s Arctic.

Kano allows your kid to build their own computer and learn to code. It’s an amazing tool that will help your kids improve their digital skills.

Make your own computer. Then learn to code

*********

Trypophobia is an aversion to the sight of irregular patterns or clusters of small holes, or bumps. Didn’t know this is really a thing…

Lego bumps

*****

Glass vs plastic when it comes to bottled water

When glass is recycled it gets turned in to more glass. It can be recycled over and over and never lose its integrity. Plastic bottles, however, are not recycled into plastic bottles. The plastic loses its integrity and needs to be turned into something different such as plastic lumber or carpet padding. Because of this, some people say that plastic isn’t truly recycled; it’s downcycled.Every time a product is packaged in a plastic bottle, jar, or other container, it’s new plastic. All new resources went into making it. Glass jars, on the other hand, can be made from recycled glass.

Protanomaly: a type of red-green color blindness in which the red cones do not detect enough red and are too sensitive to greens, yellows, and oranges.As a result, greens, yellows, oranges, reds, and browns may appear similar, especially in low light. It can also be difficult to tell the difference between blues and purples, or pinks and grays. Red and black might be hard to tell apart, especially when red text is against a black background. Read more

******

How to Build a Successful Career in Information Security / CybersecuritySome great advice from Daniel Miessler:

learn to code

build your lab

build your portfolio of projects (make sure you own your data)

practice with bounties

get involved – contribute to open source projects

be active, engage in conversations

network with others

participate to conferences

find a mentor

get certified: CISSP is the closest thing to a standard baseline that our industry has. It’s actually better than a computer science degree in a lot of organizations